Vocabulary Flashcards
access control
Sum of all the technologies, process and personnel that are responsible for controlling access to resources
account deprovisioning
the process of removing access and disabling an account when a user no longer requires access to cloud resources
account hijacking
an occurrence when an unauthorized party gains access to and takes over a privileged account
account provisioning
the process of creating user accounts and enabling access to cloud resources
address allocation
the process of assigning one or multiple IP address to a cloud resource; this can be done either dynamically or statically
adverse event
an event that comes with negative consequences
aggregate risk
the combined risk of multiple individual security flows or vulnerabilities
agile
an SDLC methodology in which development and testing activities occur simultaneously, cyclically and iteratively
anonymization
the process of removing information that can be used to identify a special individual from a dataset
Application Programming Interface (API)
a software-to-software communication link that allows two applications, such as a client and a server, to interact with one another over the Internet
application virtualiation
the process of encapsulating (or bundling) an application into a self-contained package that is isolated from the underlying operating system on which it is executed
applistructure
includes the applications that are deployed in the cloud and the underlying services used to build them
artificial intelligence (AI)
the field devoted to helping machines process things in a smart manner; AI involves giving machines the ability to imitate intelligent human behavior
asymmetric-key (public-key) encryption
a form of encryption that operates by using two keys one public and one private
audit planning
conducted at the very beginning of the audit process and includes all the steps necessary to ensure the audit is conducted thoroughly, effectively and in a timely fashion
audit report
a set of documents and artifacts that describe the findings from an audit and explain the audit’s opinion of the system that was examined
audit scope
a set statement that identifies the focus, boundary and extent of an audit
audit scope restrictions
a set of restrictions on what an auditor may and may not audit
authentication
the process of validating a user’s identity
authenticator
things used to verify a user’s identity
authorization
the process of granting access to a user based on their authenticated identity and the policies you’ve set for them
availability
security principle focused on ensuring that authorized users can access required data when and where they need it
availability management
the process of ensuring that the appropriate people, processes and systems are in place in order to sustain sufficient service availability
bandwidth allocation
the process of sharing network resources fairly between multiple users that share the cloud network